CVE-2025-48597
08.12.2025, 17:16
In multiple locations, there is a possible way to trick a user into accepting a permission due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Enginsight
| Vendor | Product | Version |
|---|---|---|
| android | 14.0 | |
| android | 15.0 | |
| android | 16.0 |
𝑥
= Vulnerable software versions